
Assets and Threats: Quiz 4
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
John Coder
FREE Resource
Enhance your content in a minute
29 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Five fun__________ make up the SHA family of algorithms:
SHA-1
SHA-224
SHA-256
SHA-384
SHA-512
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio_________ of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str__________ of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.
For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
IT support technician level-1 (MS. Word)
Quiz
•
Professional Development
24 questions
Quiz - alunos version T
Quiz
•
Professional Development
24 questions
Sistema Opertativo Jueves Matutino
Quiz
•
Professional Development
24 questions
A+ - 16C - Configure SOHO Router Security
Quiz
•
Professional Development
25 questions
İnformatika Qəbul DİM 1
Quiz
•
Professional Development
31 questions
Year 7 Computer Science Baseline
Quiz
•
KG - Professional Dev...
24 questions
AO Tema 15. Cuestionario
Quiz
•
Professional Development
25 questions
Estructura Salarial
Quiz
•
Professional Development
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
